US20080189151A1 - Use of force audit and compliance - Google Patents

Use of force audit and compliance Download PDF

Info

Publication number
US20080189151A1
US20080189151A1 US11/880,712 US88071207A US2008189151A1 US 20080189151 A1 US20080189151 A1 US 20080189151A1 US 88071207 A US88071207 A US 88071207A US 2008189151 A1 US2008189151 A1 US 2008189151A1
Authority
US
United States
Prior art keywords
force
audit
provision
those
planning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/880,712
Inventor
Sam Rosenfeld
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/880,712 priority Critical patent/US20080189151A1/en
Publication of US20080189151A1 publication Critical patent/US20080189151A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06395Quality analysis or management

Definitions

  • This patent provides for an audit capability of the use of force, to audit both private, and if required, governmental, use of force and force provision.
  • Force audits can not only provide assurance about practices and capabilities, but an audit after the use of force can provide reassurance to employers, clients or the government that the practitioner is using force in a manner that is responsible, legal, ethical and, where appropriate, conforms to the wider policy intent relative to the environment within which force was used.
  • FIG. 1 is a diagram depicting the various elements of an audit structure related to the provision and use of force.
  • FIG. 1 there is shown the various elements or categories upon which an audit structure is based to audit the provision and use of force.
  • various elements or categories are operative to determine and/or decide whether the particular application of force has not or will not be abused.
  • such elements and categories are operative to determine and/or predict whether the application of force either has or will be conserved.
  • the audit structure will, at a minimum, take into consideration the following:
  • such audit which can be referred to as a force audit, assists in the assessment of the use of force to provide assurance about specific practices and capabilities.
  • such audit can be used to assess responsibility of the application of force, as well as whether the application of such force is consistent with policy, ethics and any other applicable laws and regulations.

Abstract

The provision of force, the ability to cause injury or death, is subject to oversight, both internal and external. Such oversight provides assurance to authorities, clients and shareholders that the application of forces is not abused, but rather is conserved. An independent audit function will provide that assurance, and can be provided either as part of a wider audit or as a bespoke service.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This patent application claims priority to provisional patent application Ser. No. 60/834,095, entitled FORCE PROTECTION AUDIT AND COMPLIANCE, filed on Jul. 27, 2006.
  • STATEMENT RE: FEDERALLY SPONSORED RESEARCH/DEVELOPMENT
  • Not Applicable
  • BACKGROUND
  • Force is routinely used by private and public organizations. The police, military, government agencies, private military companies and security companies all have a routine requirement to use force. However, the standards required of the various organizations differ greatly, regardless of the geographical location.
  • In this regard, the use of force is a significant activity, one that is not only contentious but has massive implications for those upon whom force is used. The great differences in standards can lead to abuses of the power to use force.
  • There has been substantial commentary over the years about the use of force, and the standards applied to when that force has been used. Historically the review of the use of force by governmental organizations has taken place within those organizations or, after the fact, by the courts. There has been little anticipatory oversight of the organizations allowed to use force.
  • Recently it has become clear that many private organizations using force in the same environments as the US military, such as in Iraq, are using force with far less oversight than that accorded to the US military, even though the use of force by either private or public organizations in that environment will have the same detrimental effect for the US military and the wider US mission overseas. The use of force can gravely affect the tactical, operational and strategic situation for law enforcement, the military or those acting along side the military, such as private military companies. The political ramifications, at local through international level, may be significant, and therefore there must be the ability to assess the policies and activities surrounding the use of force by any potential user.
  • The use of lethal force has become much more prevalent since September 11, not only overseas, but also in environments such as New Orleans after Hurricane Katrina where private contractors were deployed with lethal force to control looting.
  • In most industries there is a clear audit trail for the manner in which operations are being carried out. The quality of vehicles being manufactured, as it relates to safety, is audited by federal authorities. The accounting support one receives is audited by the IRS. At present there is no audit provision to the security industry; such support would provide potential clients an idea of the quality of the firm they were contracting, and assurance to the government that the security companies acting in support of national interests furthered those interests not only at the strategic, but also at the tactical, level.
  • BRIEF SUMMARY
  • This patent provides for an audit capability of the use of force, to audit both private, and if required, governmental, use of force and force provision. Force audits can not only provide assurance about practices and capabilities, but an audit after the use of force can provide reassurance to employers, clients or the government that the practitioner is using force in a manner that is responsible, legal, ethical and, where appropriate, conforms to the wider policy intent relative to the environment within which force was used.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features and advantages of the various embodiments disclosed herein will be better understood with respect to the following description and drawings, in which like numbers refer to like parts throughout, and in which:
  • FIG. 1 is a diagram depicting the various elements of an audit structure related to the provision and use of force.
  • DETAILED DESCRIPTION
  • The above description is given by way of example, and not limitation. Given the above disclosure, one skilled in the art could devise variations that are within the scope and spirit of the invention disclosed herein, including various ways of taking various factors in consideration in order to conduct a force audit. Further, the various features of the embodiments disclosed herein can be used alone, or in varying combinations with each other and are not intended to be limited to the specific combination described herein. Thus, the scope of the claims is not to be limited by the illustrated embodiments.
  • Referring now to FIG. 1, there is shown the various elements or categories upon which an audit structure is based to audit the provision and use of force. In this regard, various elements or categories are operative to determine and/or decide whether the particular application of force has not or will not be abused. Moreover, such elements and categories are operative to determine and/or predict whether the application of force either has or will be conserved. To that end, the audit structure will, at a minimum, take into consideration the following:
      • a. Use of Force. That prior planning and briefing take place about the use of force, that the use of standards and Rules of Engagement are policed, there is accountability and after-action reviews take place and implement recommendations.
      • b. Risk Assessment Processes. That risks are identified, assessed and mitigated against using a coherent process and structure.
      • c. Communications. That there is the provision of sufficient, robust communications to support the mission.
      • d. Medical Planning and Provision. That there is appropriate medical equipment, logistics and planning.
      • e. Operational Planning. The use of a formal planning process that identifies and classifies threats and is mindful of both resources and limitations.
      • f. Operational Conduct. The exercise of appropriate skills and judgement.
      • g. Training. Ensure that those who may use force are trained in the use of all equipment, rules of engagement and associated skills and knowledge to use force appropriately. Ensure that the training is standards, rather than time spent, based. Ensure that skill levels are maintained, and effective
      • h. Command Structure: That there is an appropriate, robust command structure to manage the use of force and to take appropriate action against those who misuse force.
      • i. Rules of Engagement. That there are clear, realistic and workable rules under which those who are able to use force are entitled under the law and operational policy do so.
      • j. Independent Reporting. That there is a means for those who witness the inappropriate use of force to report it, outside the immediate chain of command.
      • k. Equipment and Equipment Support. All equipment involved in the use of force must be appropriate to the task, and compatible with the doctrine, policies, tactics, techniques and procedures. The equipment must be maintained correctly, appropriate to its stated role and supported with spares, maintenance and maintenance skill levels to ensure that it is effective when required.
      • l. Policy. That there is a clear use of force policy in place, which is expressed to those likely to use force in a set of Rules of Engagement.
      • m. People. That there is policy and a legal framework in place that clearly states the obligations and rights of those who use force. That there is an educational process in place that states to the users of force their status, their protection under the law and the laws, policies and their rights under those laws.
      • n. Effect. An assessment of how the use of force policies are affecting the mission(s) of the using organization, and their effect on the wider context. This assessment may include, but is not exclusive to, political, economic and media effects.
  • Additional modifications and improvements of the present invention may also be apparent to those of ordinary skill in the art. Thus, the particular combination of parts and steps described and illustrated herein is intended to represent only certain embodiments of the present invention, and is not intended to serve as limitations of alternative devices and methods within the spirit and scope of the invention.
  • As discussed above, such audit, which can be referred to as a force audit, assists in the assessment of the use of force to provide assurance about specific practices and capabilities. In addition, such audit can be used to assess responsibility of the application of force, as well as whether the application of such force is consistent with policy, ethics and any other applicable laws and regulations.

Claims (3)

1. An audit structure for providing the assessment and evaluation of the provision and use of force.
2. The audit structure of claim 1 wherein said structure is based upon the following categories;
a. Use of Force;
b. Risk Assessment Processes;
c. Communications;
d. Medical Planning and Provision;
e. Operational Planning;
f. Operational Conduct;
g. Training;
h. Command Structure.
i. Policy;
j. Rules of Engagement;
k. Equipment and Equipment Support;
l. Independent Reporting;
m. People; and
n. Effect.
3. That audit can be provided to commercial, not for profit, government or any other organization.
US11/880,712 2006-07-27 2007-07-24 Use of force audit and compliance Abandoned US20080189151A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/880,712 US20080189151A1 (en) 2006-07-27 2007-07-24 Use of force audit and compliance

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US83409506P 2006-07-27 2006-07-27
US11/880,712 US20080189151A1 (en) 2006-07-27 2007-07-24 Use of force audit and compliance

Publications (1)

Publication Number Publication Date
US20080189151A1 true US20080189151A1 (en) 2008-08-07

Family

ID=39676947

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/880,712 Abandoned US20080189151A1 (en) 2006-07-27 2007-07-24 Use of force audit and compliance

Country Status (1)

Country Link
US (1) US20080189151A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020138317A1 (en) * 2001-03-21 2002-09-26 Milling Systems And Concepts Pte Ltd. System for implementing an exchange
US20020143595A1 (en) * 2001-02-05 2002-10-03 Frank Theodore W. Method and system for compliance management
US20040008125A1 (en) * 2002-02-11 2004-01-15 Michael Aratow System and method for emergency response
US20040177326A1 (en) * 2002-10-21 2004-09-09 Bibko Peter N. Internet/intranet software system to audit and manage compliance
US20050071185A1 (en) * 2003-08-06 2005-03-31 Thompson Bradley Merrill Regulatory compliance evaluation system and method
US20050228685A1 (en) * 2004-04-07 2005-10-13 Simpliance, Inc. Method and system for rule-base compliance, certification and risk mitigation
US20050288994A1 (en) * 2004-06-23 2005-12-29 Haunschild Gregory D Method for auditing to determine compliance
US20060026056A1 (en) * 2004-07-30 2006-02-02 Council Of Better Business Bureaus, Inc. Method and system for information retrieval and evaluation of an organization

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020143595A1 (en) * 2001-02-05 2002-10-03 Frank Theodore W. Method and system for compliance management
US20020138317A1 (en) * 2001-03-21 2002-09-26 Milling Systems And Concepts Pte Ltd. System for implementing an exchange
US20040008125A1 (en) * 2002-02-11 2004-01-15 Michael Aratow System and method for emergency response
US20040177326A1 (en) * 2002-10-21 2004-09-09 Bibko Peter N. Internet/intranet software system to audit and manage compliance
US20050071185A1 (en) * 2003-08-06 2005-03-31 Thompson Bradley Merrill Regulatory compliance evaluation system and method
US20050228685A1 (en) * 2004-04-07 2005-10-13 Simpliance, Inc. Method and system for rule-base compliance, certification and risk mitigation
US20050288994A1 (en) * 2004-06-23 2005-12-29 Haunschild Gregory D Method for auditing to determine compliance
US20060026056A1 (en) * 2004-07-30 2006-02-02 Council Of Better Business Bureaus, Inc. Method and system for information retrieval and evaluation of an organization

Similar Documents

Publication Publication Date Title
President’s Commission on Critical Infrastructure Protection Critical foundations: protecting America’s infrastructures: The report of the President’s Commission on Critical Infrastructure Protection
Kirkpatrick Cyber policies on the rise
Van der Staak et al. Cybersecurity in elections: Models of interagency collaboration
Congram et al. Policing transnational organized crime and corruption: Exploring the role of communication interception technology
US20080189151A1 (en) Use of force audit and compliance
Hudson Integrating organisational culture into incident analyses: extending the bow tie model
Marrone et al. Cyber Defence in NATO Countries: Comparing Models
Morodi et al. Environmental decision making on acid mine drainage issues in South Africa: An argument for the precautionary principle
Lehto et al. Cyber Security Capability and ƚŚĞ Case ŽĨ Finland
Norden et al. A framework for election vendor oversight
Davies et al. Risk management: Holistic risk management
Naseir National cybersecurity capacity building framework for counties in a transitional phase.
Martin et al. Power sector cybersecurity building blocks
Schwieger et al. Cyber Insurance Concepts for the MIS and Business Curriculum.
Keey Risk management: An australasian view
Lirëza et al. Environmental Crimes: Their Nature, Scope, and Problems in Identification
Pita Real-World Cyber Security Challenges in Rail Systems
Shaw et al. The UK’s Cyber Security Code of Practice for Ships
Krausz Managing information security breaches: Studies from real life
Ness Securing utility and energy infrastructures
Brown Privateers in Australia’s conflict and disaster zones
Bronskill Flying the Secret Skies Difficulties in Obtaining Data on Canadian Airport Security Screening Tests Following 9/11
Bace The Insurer of Last Resort: Investigating a Federal Insurance Backstop for Catastrophic Cyber Incidents
Габорець ENSURING CYBERSECURITY OF UKRAINE AGAINST CYBERTERRORISM THREATS: A SYSTEMATIC APPROACH
Grossman Inside New York's Cyber Regulation

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION